How many breaches that were made public pertain

Assignment Help Other Subject
Reference no: EM133015794

Laboratory - Keylogger and Data breaches

Description:
This manual is for running experiment on software based Key logger - Spyrix Keylogger and for examining data breaches incidents published by a non-profit organization.

Exercises 1 : Use a Software Keylogger

Pre-work:
1. Launch Virtual Box
2. Launch your Win8.1 VM
3. Do all your exercises in the VM

Keylogger: A key logger program captures everything that a user enters on a computer keyboard. In this project, you will download and use a software key logger.

1. Open your web browser and enter the URL: www.spyrix.com
[The location of content on the Internet may change without warn- ing. If you are no longer able to access the program through the above URL, use a search engine to search for "Spyrix Personal Monitor".]
2. Click products and compare the features of the different Spyrix products.
3. Click download.
4. Under Spyrix Free Keylogger click Free Download.
5. When the file finishes downloading, install Spyrix and follow the default installation procedures.
6. Click Finish to launch Spyrix.
7. Click Next to use the wizard to set the program settings.
8. The Hide everywhere is not available on the Free Keylogger version but for the other versions this would allow Spyrix to act like a rootkit with no traces available. Click Next.
9. Create a strong password and enter it under Password to protect access to the program. Click Next.
10. Change Screenshot Quality to Medium Quality - Medium Size. Click Next.
11. Check Online Monitoring (via any web-browser) to set up the ability to view activity online. Click OK.
12. Enter your email address and create another strong password. Click Create NEW Online Monitoring Account. When the account is set up a message will appear. Click OK.
13. Click Test secure connection.
14. Click Try to send log.
15. Click Enter your online monitoring account.
16. Enter your username and password.
17. Click Remote computer settings.
18. Under Delivery Interval change the time to 2 minutes. Click Apply.
19. Close the web browser to return to the Spyrix
20. Under Delivery Interval change the time to 2 minutes. Click Next.
21. If prompted enter your Spyrix password.
22. Click the Spyrix icon in your system tray and enter the password.
23. Click Start.
24. Click Minimize.
25. Now use your computer for several minutes as you normally would.
26. Open your web browser and go to spyrix.net and enter your username and password.
27. Under Events click ALL EVENTS to view everything that has been done on the computer.
28. Click Screenshots. In the Value column click a screenshot.
29. Click Program Activity to view the programs that you were using.
30. Select several other options to view the keylogging and spy features of this program.
31. Close the web browser.
32. Click the Spyrix icon in your system tray and enter the password.
33. Click Stop and then Exit.
34. Enter your password and click OK.
35. Close all windows.

Exercise 2: Examine Data Breaches

The Privacy Rights Clearinghouse (PRC) is a non-profit organization whose goals are to raise consumers' awareness of how technology affects personal privacy and empower consumers to take action to control their own personal information. The PRC maintains a searchable database of security breaches that impact consumer's privacy. In this exercise, you will gather information from the PRC website.

1. Open a web browser and enter the URL www.privacyrights.org/data-breach.
[The location of content on the internet may change without warning. If you are no longer able to access the site through the above web address, use a search engine to search for "Privacy Rights Clearinghouse Data Breach"]

2. First spend time reading about the RPC. Click About Us in the toolbar.

3. Scroll down to the content under Mission and Goals and also under services. Spend a few minutes reading about the PRC.

4. Click your browser's Back button to return to the previous page.

5. On the Chronology of Data Breaches page scroll down and observe the different breaches listed in chronological order.

6. Now create a customized list of the data that will only list data breaches of educational institutions. Scroll back to the top of the page.

7. Under Select organization type(s), uncheck all organizations except Educational Institutions.

8. Click GO!

9. Scroll down to Breach Subtotal if necessary. How many breaches that were made public pertain to educations institutions?

10. Scroll down and observe the breaches for educational institutions.

11. Scroll back to the top of the page. Click New Search, locate beneath the GO! button.

12. Now search for breaches that were a result of lost, discarded, or stolen equipment that belonged to the government and military. Under Choose the type of breaches to display, uncheck all types except Portable devices (PORT) - Lost, discarded or stolen laptop, PDA, smartphone, portable memory device, CD, hard drive, data tape, etc.

13. Under Select organization types(s), uncheck all organizations except GOV - Government and Military.

14. Click GO!.

15. Scroll down to Breach Subtotal, if necessary. How many breaches that were made public pertain to this type?

16. Scroll down and observe the breaches for governmental institutions.

17. Scroll back to the top of the page.

18. Now create a search based on criteria that you are interested in, such as the Payment Card Fraud against Retail/Merchants during the current year.

19. When finished, close all windows.

Attachment:- Manual keylogger data breaches.rar

Reference no: EM133015794

Questions Cloud

Why is it important for caregivers : Why is it important for caregivers to play as well as children?
What are the essential points : What are the essential points and a graph of this article?
Employees taking care of small details : For this installment in your leadership journal, enter how you capitalized or did not capitalize on the opportunity to think strategically during the last week,
Tax levied on smokeable forms of cannabis : Consider this statement. Government should implement a policy that sees the tax levied on smokeable forms of cannabis be priced higher/taxed heavier than edible
How many breaches that were made public pertain : Create a search based on criteria that you are interested in, such as the Payment Card Fraud against Retail/Merchants during the current year
What is the deferred tax item that is recognised : A subsidiary sold inventories to its parent for $100 000. The company tax rate is 30%. What is the deferred tax item that is recognised on consolidation
Prepare the corrected unadjusted trial balance at June : The balance of Advertising Expense is $600, but it was listed as $400 on the trial balance. Prepare the corrected unadjusted trial balance at June
Explore the functionalities of iptables : Explore the functionalities of iptables, the Linux firewall and write some rules - Explore the functionalities of iptables, the Linux firewall
How many shares must be sold : The share currently sells for $8.00 and there are 150 million shares outstanding. How many shares must be sold if the subscription price is $7.50

Reviews

Write a Review

Other Subject Questions & Answers

  Maintaining ethical business relationships

CORPORATE COMPLIANCE and MAINTAINING ETHICAL BUSINESS RELATIONSHIPS. Prepare the portfolio paper

  Evaluate your impression of international juvenile justice

Read the United Nations Fact Sheets on Youth. Based on this information, evaluate your impression of international juvenile justice and violent crime.

  Which tasks are on the critical path of the pert chart above

One of your two critical systems analysts might be leaving the firm sighting critical family reasons. What actions would you take to ensure the original delivery time is still met?

  African american tradition of resistance

What are the role of women in the African American tradition of resistance? How do women rebel against the ever constant racism and sexism in their lives?

  The principle of dominant-recessive genes involves

The principle of dominant-recessive genes involves ______, while the principle of plygenic inheritance involves _____ genes.

  Manual material-handling work cycle

The standard time for a manual material-handling work cycle is 2.58 min per piece. The PFD allowance factor used to set the standard was 13%. During a particular 8-hour shift of interest, it is known that the worker lost a total of 53 min due to pers..

  Explore the aging of the skin and musculoskeletal system

In your own words, describe and explore the aging of the skin and musculoskeletal system. What theory of aging interests you the most and why? How would you explain this theory of aging to a friend that wanted to learn all about it

  List visible planet in order of increasing distance from sun

List the visible planets in order of increasing distance from Sun. Is Mercury orbit perfectly circular or is it slightly egg shaped?

  Over repeated trials,the rat consistently jumping to left

Generate hypothesis,move food to the right ,the rat will jumping to the right,this is wrong

  Explain article on project management information technology

You will find two present article associated to project management, sum-up the articles in your own words, and then explain how the article associates to Project management information technology.

  Differences in the way the process is performed

ACC203 – Accounting Information Systems - What are the major differences in the way the process is performed - Explain how this case demonstrates

  How information technology and data have changed outcomes

Using two Quality Performance indicators, provide a comparison and contrast example of how information technology and data have changed patient care outcomes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd